gourk / FirePwd.Net
Password reader for Mozilla Firefox and Thunderbird
☆23Updated 4 years ago
Related projects: ⓘ
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 4 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- .NET project for writing files to local or remote hosts☆38Updated 4 years ago
- Execute Shellcode And Other Goodies From MMC☆12Updated 9 years ago
- Obtain and parse SSL certificates☆9Updated 2 years ago
- c# reverse shell poc☆27Updated 5 years ago
- ☆11Updated 4 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆17Updated 6 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 3 years ago
- ☆10Updated this week
- module for certexfil☆15Updated 2 years ago
- ☆14Updated 4 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- C# Situational Awareness Script☆34Updated 5 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆26Updated 4 years ago
- jgraphx 4.0.4 build for cs project☆22Updated 3 years ago
- miscellaneous sploit scripts/hacks☆13Updated 2 months ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆42Updated 2 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Updated 3 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Updated 3 weeks ago
- Windows 权限提升 BadPotato☆12Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆29Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆12Updated last year
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 4 years ago
- How to write inline c# in xaml☆8Updated 10 years ago
- post exploitation user monitoring tool☆19Updated 6 years ago
- L3 proxy backed by Shadowsocks☆10Updated last year
- C2 and Post Exploitation Code☆34Updated 3 weeks ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆11Updated 2 years ago
- ☆8Updated 3 years ago